{"uuid": "fa5c6e27-1fea-42e0-b18c-0ba45ec5dab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29927", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/149", "content": "\ud83d\udea8 CVE-2025-29927: Next.js Middleware Bypass Vulnerability \ud83d\udea8\n\n\u26a0\ufe0f A serious vulnerability in Next.js Middleware allows attackers to bypass security mechanisms and exploit vulnerable systems, affecting millions of users!\n\n\ud83d\udd39 Proof of Concept (PoC):\n\n\ud83d\udd25 PoC Repository:\n\n \u2022 CVE-2025-29927\n\n\ud83c\udfaf Over 5 Million Results found on FOFA over the last year!\n\nQueries:\n\n \u2022 HUNTER:\n\nproduct.name=\"Next.js\"\n\n \u2022 FOFA:\n\nproduct=\"NEXT.JS\"\n\n \u2022 SHODAN:\n\nNext.js\n\n\ud83d\udd16 For More Information:\n\ud83d\udcd6 \nCVE-2025-29927 Blog Post\n\n\u2e3b\n\n\ud83d\udca5 Pro Tip: Check your Next.js applications for any unpatched versions of Middleware that could be vulnerable to this bypass!\n\n\u26a0\ufe0f For educational purposes only. Always test responsibly! \u26a0\ufe0f\n\n\ud83d\ude80 Join @CyberSecPlayground for more bug bounty tips, vulnerability details, and exclusive tools!\n\n\ud83d\udd17 Join Now\n\n\ud83d\udce2 #OSINT #FOFA #CyberSecurity #Vulnerability #CVE2025 #BugBounty #NextJS #CyberSecPlayground", "creation_timestamp": "2025-03-25T12:23:24.000000Z"}